Analysis
-
max time kernel
133s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 00:09
Static task
static1
Behavioral task
behavioral1
Sample
21a8d607902f262805472ecb0e61d94ed60b44889ddde879bd76d760a00385a0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
21a8d607902f262805472ecb0e61d94ed60b44889ddde879bd76d760a00385a0.exe
Resource
win10v2004-20230220-en
General
-
Target
21a8d607902f262805472ecb0e61d94ed60b44889ddde879bd76d760a00385a0.exe
-
Size
1.2MB
-
MD5
c03feaebce0439a71d8646cc4991f3e5
-
SHA1
62e84fa679682245900955bf440565316b9c5669
-
SHA256
21a8d607902f262805472ecb0e61d94ed60b44889ddde879bd76d760a00385a0
-
SHA512
e82560bea25e46c88c16a5a5b6e3eb4bfae3f5482e3f6f459599ec420cb7070cee99728e5c667b771869b564d1c76f3bd961de1edb53db32c2edfaa17e79a691
-
SSDEEP
24576:OynG4mCWtu0+PZpDFpSgEjlDrRANxNrr1N7pgmq/TjvBEUSfxzk:dnGGzRbEjhUjLqdL9U
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/4592-2337-0x00000000052A0000-0x00000000058B8000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s12149436.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation s12149436.exe -
Executes dropped EXE 6 IoCs
Processes:
z51124290.exez25097920.exez49628910.exes12149436.exe1.exet01272710.exepid process 2412 z51124290.exe 1420 z25097920.exe 2736 z49628910.exe 324 s12149436.exe 4592 1.exe 2784 t01272710.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z49628910.exe21a8d607902f262805472ecb0e61d94ed60b44889ddde879bd76d760a00385a0.exez51124290.exez25097920.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z49628910.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z49628910.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 21a8d607902f262805472ecb0e61d94ed60b44889ddde879bd76d760a00385a0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 21a8d607902f262805472ecb0e61d94ed60b44889ddde879bd76d760a00385a0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z51124290.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z51124290.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z25097920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z25097920.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2232 324 WerFault.exe s12149436.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s12149436.exedescription pid process Token: SeDebugPrivilege 324 s12149436.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
21a8d607902f262805472ecb0e61d94ed60b44889ddde879bd76d760a00385a0.exez51124290.exez25097920.exez49628910.exes12149436.exedescription pid process target process PID 4556 wrote to memory of 2412 4556 21a8d607902f262805472ecb0e61d94ed60b44889ddde879bd76d760a00385a0.exe z51124290.exe PID 4556 wrote to memory of 2412 4556 21a8d607902f262805472ecb0e61d94ed60b44889ddde879bd76d760a00385a0.exe z51124290.exe PID 4556 wrote to memory of 2412 4556 21a8d607902f262805472ecb0e61d94ed60b44889ddde879bd76d760a00385a0.exe z51124290.exe PID 2412 wrote to memory of 1420 2412 z51124290.exe z25097920.exe PID 2412 wrote to memory of 1420 2412 z51124290.exe z25097920.exe PID 2412 wrote to memory of 1420 2412 z51124290.exe z25097920.exe PID 1420 wrote to memory of 2736 1420 z25097920.exe z49628910.exe PID 1420 wrote to memory of 2736 1420 z25097920.exe z49628910.exe PID 1420 wrote to memory of 2736 1420 z25097920.exe z49628910.exe PID 2736 wrote to memory of 324 2736 z49628910.exe s12149436.exe PID 2736 wrote to memory of 324 2736 z49628910.exe s12149436.exe PID 2736 wrote to memory of 324 2736 z49628910.exe s12149436.exe PID 324 wrote to memory of 4592 324 s12149436.exe 1.exe PID 324 wrote to memory of 4592 324 s12149436.exe 1.exe PID 324 wrote to memory of 4592 324 s12149436.exe 1.exe PID 2736 wrote to memory of 2784 2736 z49628910.exe t01272710.exe PID 2736 wrote to memory of 2784 2736 z49628910.exe t01272710.exe PID 2736 wrote to memory of 2784 2736 z49628910.exe t01272710.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21a8d607902f262805472ecb0e61d94ed60b44889ddde879bd76d760a00385a0.exe"C:\Users\Admin\AppData\Local\Temp\21a8d607902f262805472ecb0e61d94ed60b44889ddde879bd76d760a00385a0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z51124290.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z51124290.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z25097920.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z25097920.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z49628910.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z49628910.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s12149436.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s12149436.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
PID:4592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 324 -s 15126⤵
- Program crash
PID:2232
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t01272710.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t01272710.exe5⤵
- Executes dropped EXE
PID:2784
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 324 -ip 3241⤵PID:4816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5eb6a1e26aa23f9db01dd5cbbe27397f3
SHA151b9dc4067d2bce38d7d5c9a389af61c2edde799
SHA256de34b96d1c986eefe000eab190fa0014b794a28f4193e3fb6b61f1ca3e4c3d3b
SHA512aab8350146e3ec09a2bced56294725b75f8359daeefd4c570f293f1bb6d20b4642482d23f048c9820a67552151671a914ebdbb94f051dfbf41b4e6aff567d4fc
-
Filesize
1.0MB
MD5eb6a1e26aa23f9db01dd5cbbe27397f3
SHA151b9dc4067d2bce38d7d5c9a389af61c2edde799
SHA256de34b96d1c986eefe000eab190fa0014b794a28f4193e3fb6b61f1ca3e4c3d3b
SHA512aab8350146e3ec09a2bced56294725b75f8359daeefd4c570f293f1bb6d20b4642482d23f048c9820a67552151671a914ebdbb94f051dfbf41b4e6aff567d4fc
-
Filesize
763KB
MD50b3a5269b1c373588c42c0e85ab8a11a
SHA12ccc0b710d51ca605ffcf5a10d16fba1f909fa7f
SHA256d477c14d429d2def9b7d928c38c4c474c0c96c5a8c1c4afaa97954d160471bea
SHA5129dd02b780efc05719ba49baeaf850d3229d1f57007378c9406812a35e5fd9a82ade6dd972a3ac859f71a6fc4cbbc4ce2e15ebaa283ed9abb396bb11b983ecda3
-
Filesize
763KB
MD50b3a5269b1c373588c42c0e85ab8a11a
SHA12ccc0b710d51ca605ffcf5a10d16fba1f909fa7f
SHA256d477c14d429d2def9b7d928c38c4c474c0c96c5a8c1c4afaa97954d160471bea
SHA5129dd02b780efc05719ba49baeaf850d3229d1f57007378c9406812a35e5fd9a82ade6dd972a3ac859f71a6fc4cbbc4ce2e15ebaa283ed9abb396bb11b983ecda3
-
Filesize
581KB
MD58d410a2e99b428ecd3c7a9cbe9b831a3
SHA146c45e98623f9275769e99aa83433db16b72f8cc
SHA256baa0db8dbd7d2bc7c3a6477a59676820517bc3d05c62a447a7c658a4c4c25ed5
SHA51293f962a11caa5b338487b7c254e2ecbf038a3717263e0fe0f45eccdabda2bf199e5398308e9b66451c5dd21cdcca8aacbd59ee73b8fe054b88fffe9a9fc9e41e
-
Filesize
581KB
MD58d410a2e99b428ecd3c7a9cbe9b831a3
SHA146c45e98623f9275769e99aa83433db16b72f8cc
SHA256baa0db8dbd7d2bc7c3a6477a59676820517bc3d05c62a447a7c658a4c4c25ed5
SHA51293f962a11caa5b338487b7c254e2ecbf038a3717263e0fe0f45eccdabda2bf199e5398308e9b66451c5dd21cdcca8aacbd59ee73b8fe054b88fffe9a9fc9e41e
-
Filesize
580KB
MD572c56ae3429cd019b76668eecdcf5f48
SHA19093d5d35fb130857ea761ef323ac33dea1822cb
SHA256213eeca14abdf10e42af14fb29d2e5ab31ab2b3053fe71e9227295a57b674207
SHA5124a9bbdf16374e2e9ceca462371cedb58468cdcc9a90f62814be564695d3d13acae899834f5c209e822c30b263d3c49e05b6e586885133421c389ce9838e81e37
-
Filesize
580KB
MD572c56ae3429cd019b76668eecdcf5f48
SHA19093d5d35fb130857ea761ef323ac33dea1822cb
SHA256213eeca14abdf10e42af14fb29d2e5ab31ab2b3053fe71e9227295a57b674207
SHA5124a9bbdf16374e2e9ceca462371cedb58468cdcc9a90f62814be564695d3d13acae899834f5c209e822c30b263d3c49e05b6e586885133421c389ce9838e81e37
-
Filesize
169KB
MD58583e856338a56a594cfe637f95e4f2a
SHA179412218189e77641011ff5608f958a9f7ce5adc
SHA256c80e1a58b3af5a91247794dd97de5af7f69ecafaee6d707b26205231f4354674
SHA5125d24ce8421a9a99e5a7dcccc627b0560960f2ed8d8c1c7a256d19ec7bf35a29e08e72d489f6352615543855b9e4d97255f44488ab23697877dcb22c4c17c594a
-
Filesize
169KB
MD58583e856338a56a594cfe637f95e4f2a
SHA179412218189e77641011ff5608f958a9f7ce5adc
SHA256c80e1a58b3af5a91247794dd97de5af7f69ecafaee6d707b26205231f4354674
SHA5125d24ce8421a9a99e5a7dcccc627b0560960f2ed8d8c1c7a256d19ec7bf35a29e08e72d489f6352615543855b9e4d97255f44488ab23697877dcb22c4c17c594a
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf